Recent #Privacy news in the semiconductor industry

3 months ago

➀ The German Cyber Security Agency (Cyberagentur) launched the ATARA research program to explore AI's ability to identify unknown cyberattack paths using publicly accessible data and develop defense strategies;

➁ The project adopts a dual-role approach where AI simulates both attacker and defender perspectives, aiming to generate novel attack scenarios and countermeasures beyond human experts' traditional analyses;

➂ Universities, companies, and startups with expertise in cybersecurity and machine learning can apply for participation, with a submission deadline of August 29, 2025.

AIPrivacycybersecurity
3 months ago

➀ The article explores the challenge design engineers face in balancing connectivity and security, using vehicle access systems as a case study;

➁ Bluetooth Channel Sounding technology is highlighted as a potential solution for secure proximity-based systems, but faces real-world hurdles like smartphone compatibility and latency issues;

➂ Key lessons include prioritizing user-centric design, addressing security vulnerabilities early, and ensuring reliability in complex connected ecosystems.

Privacyautomotivecybersecurity
3 months ago

➀ Winaero Tweaker is a free utility that enables deep customization of Windows 11/10, including removing ads, disabling telemetry/data tracking, and eliminating AI Copilot;

➁ The tool allows advanced users to freeze system states for benchmarking by disabling driver/Windows updates, while also restoring nostalgic features like classic shutdown shortcuts;

➂ Caution is advised when disabling critical security features like User Account Control (UAC), as it increases system vulnerability risks.

MicrosoftPrivacyWindows
3 months ago

➀ UK proposes to ban public sector and critical infrastructure operators from paying ransomware ransoms;

➀ Businesses must notify government before making payments, enabling compliance checks with sanctions;

③ New mandatory attack reporting policies in development to enhance law enforcement capabilities and deter ransomware operations.

Privacycybersecurity
3 months ago

➀ Forensic expert Kirk Garrison identifies unique toolmarks on 3D-printed ghost guns, linking them to specific printers through microscopic patterns in filament layers;

➁ The method can narrow investigations but faces limitations from variable factors like nozzle settings and print bed positioning;

➂ This pioneering forensic approach, though unproven in court, highlights growing efforts to combat untraceable weapons amid challenges in 3D printing regulation.

3D printingPrivacycybersecurity
3 months ago

➀ A former UK National Crime Agency officer stole 50 bitcoins (now worth $6M) during Silk Road 2.0 investigation;

➁ The theft remained undetected for 4 years until the case's prime suspect exposed the missing funds;

➂ Digital evidence from hidden notebooks and iPhone led to the officer's conviction and 66-month sentence.

CryptocurrencyPrivacycybersecurity
3 months ago

➀ A wireless security vulnerability in U.S. trains, allowing unauthorized brake activation via $500 hardware, has persisted since 2012 despite researcher warnings;

➁ The American Association of Railways (AAR) dismissed the issue as 'theoretical' for over a decade until CISA's 2025 public advisory forced action;

➂ Implementation of a patch is delayed until 2027, raising concerns about rail safety and systemic negligence in critical infrastructure.

Privacyautomotivecybersecurity
4 months ago

➀ A 2024 Pew Research survey reveals 48% of U.S. teens believe social media has a mostly negative impact, up from 32% in 2022, with mental health as a key concern;

➁ 55% of parents express extreme concern about teen mental health, while 35% of teens share similar worries for their generation;

➂ Social media is cited as the top threat to mental health by 44% of parents and 22% of teens, with bullying and societal pressures also highlighted in personal accounts.

Privacycybersecurity
4 months ago

➀ Developer Michael Lynch discovered an insecure RMA status portal at goHardDrive, exposing customer names, addresses, and contact details through sequential RMA number guessing;

➁ Despite adding ZIP code and house number verification, the 4.2 million permutation vulnerability remained exploitable via brute-force attacks;

➂ The company closed the portal and offered Lynch a $20 refund instead of industry-standard bug bounty rewards, raising concerns about data security practices.

Privacycybersecurity
4 months ago

➀ U.S. Department of Justice dismantled 29 North Korean 'laptop farms' across 16 states, uncovering IT workers who fraudulently obtained jobs at over 100 U.S. companies to fund nuclear programs;

➁ Operatives used VPNs, stolen identities, and U.S.-based collaborators to bypass sanctions, with some stealing $900,000 in cryptocurrency;

➂ Google Cloud reports expanded North Korean operations in Europe, while AI tools complicate detection of fraudulent job applicants.

GooglePrivacycybersecurity
4 months ago

① Bitcoin Depot accuses law enforcement of overreach for forcibly opening crypto ATMs to seize cash meant for scam victims, claiming it violates banking laws;

② The company argues funds in ATMs legally belong to them, and improper seizures "create another victim";

③ Lack of crypto transaction understanding leads to destructive enforcement methods, while scammers increasingly exploit such ATMs due to anonymity challenges.

PrivacySoftwarecybersecurity
5 months ago

➀ pureLiFi introduces Kitefin XE, a LiFi-based system enhancing network security through light-based wireless communication to counter rising threats;

➁ The technology, initially reserved for national security, expands to government, defense, and enterprises, enabling secure wireless connectivity previously deemed impossible;

➂ LiFi offers superior security against detection/interception, higher capacity than WiFi, and low latency, backed by pureLiFi’s alliance with In-Q-Tel for U.S. national security applications.

Privacycybersecuritysemiconductor
5 months ago

① Tesla plans to launch a robotaxi service in Austin, prompting Reuters to request two years of correspondence between Tesla and city authorities for review;

② Tesla opposes the request, arguing disclosure would benefit competitors, and has historically been less transparent about autonomous driving data compared to other companies;

③ The Texas Attorney-General is deciding on compliance, amid potential White House influence due to ongoing tensions between President Biden and Elon Musk.

PrivacyTeslaautomotive
5 months ago

➀ Ed falls for a woman at a diplomatic event, later discovered to be a Chinese spy;

➁ MI6 warns him of her ties to China's Ministry of State Security, but the Prime Minister advises leveraging the relationship to feed disinformation;

➂ Ed plans to use her as a conduit to attract Chinese investment in his startups.

Privacycybersecurity
5 months ago

➀ The article demonstrates using the 'passwd' command to change personal passwords, manage other users' credentials via sudo privileges, and enforce security policies like password expiration.

➁ Advanced functionalities include locking/unlocking accounts, auditing password status, and setting warning/inactivity periods for system-wide security maintenance.

➂ Practical examples (e.g., 'sudo passwd -e tom') and terminal screenshots guide administrators through enforcing best practices in password management.

LinuxPrivacycybersecurity
5 months ago

➀ Ed devises a strategy to undermine Putin by exposing his corruption and fabricating compromising videos, aiming to erode public and elite support in Russia;

➁ Despite media censorship, half of Russia’s population uses VPNs and encrypted tools like Telegram and Tor, enabling targeted distribution of anti-Putin content;

➂ Ed’s team profits from Western porn platforms by monetizing the propaganda videos, funded covertly by the UK government.

PrivacySoftwarecybersecurity
5 months ago

➀ A developer created Defendnot, a tool exploiting an undocumented Windows Security Center API to disable Windows Defender by simulating third-party antivirus registration;

➁ The tool injects code into Windows Task Manager, leaving systems vulnerable as it mimics antivirus software without actual protection;

➂ Microsoft flagged Defendnot as a Trojan, warning of its potential misuse, while debates arise over user autonomy versus system security risks.

MicrosoftPrivacycybersecurity
6 months ago

➀ Apple has proposed a resolution for a privacy issue related to Siri, offering a $95 million settlement to affected users.

➁ The issue was revealed in 2019 when it was discovered that Apple had contractors listening to Siri conversations to improve the digital assistant.

➂ Eligible users who owned or purchased a Siri-enabled device during a specific period can claim a portion of the settlement.

AppleLawsuitPrivacySiriclass action lawsuit